Количество 42
Количество 42
ELSA-2014-3054
ELSA-2014-3054: unbreakable enterprise kernel security update (IMPORTANT)
ELSA-2014-3053
ELSA-2014-3053: unbreakable enterprise kernel security update (IMPORTANT)
ELSA-2014-0981
ELSA-2014-0981: kernel security, bug fix, and enhancement update (IMPORTANT)

CVE-2014-0196
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

CVE-2014-0196
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

CVE-2014-0196
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
CVE-2014-0196
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel th ...
GHSA-xwpg-vm43-3qwm
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
ELSA-2014-0678
ELSA-2014-0678: kernel security update (IMPORTANT)

BDU:2014-00333
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии

BDU:2014-00109
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии

CVE-2012-6647
The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command.

CVE-2012-6647
The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command.

CVE-2012-6647
The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command.
CVE-2012-6647
The futex_wait_requeue_pi function in kernel/futex.c in the Linux kern ...

BDU:2014-00064
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании

SUSE-SU-2015:0652-1
Security update for Kernel
ELSA-2014-3052
ELSA-2014-3052: unbreakable enterprise kernel security update (IMPORTANT)
GHSA-mvmp-r53f-9r47
The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command.
ELSA-2014-3034
ELSA-2014-3034: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2014-3054 ELSA-2014-3054: unbreakable enterprise kernel security update (IMPORTANT) | почти 11 лет назад | |||
ELSA-2014-3053 ELSA-2014-3053: unbreakable enterprise kernel security update (IMPORTANT) | почти 11 лет назад | |||
ELSA-2014-0981 ELSA-2014-0981: kernel security, bug fix, and enhancement update (IMPORTANT) | почти 11 лет назад | |||
![]() | CVE-2014-0196 The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings. | CVSS3: 5.5 | 60% Средний | около 11 лет назад |
![]() | CVE-2014-0196 The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings. | CVSS2: 6.9 | 60% Средний | около 11 лет назад |
![]() | CVE-2014-0196 The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings. | CVSS3: 5.5 | 60% Средний | около 11 лет назад |
CVE-2014-0196 The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel th ... | CVSS3: 5.5 | 60% Средний | около 11 лет назад | |
GHSA-xwpg-vm43-3qwm The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings. | CVSS3: 5.5 | 60% Средний | около 3 лет назад | |
ELSA-2014-0678 ELSA-2014-0678: kernel security update (IMPORTANT) | почти 11 лет назад | |||
![]() | BDU:2014-00333 Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии | CVSS2: 6.9 | 60% Средний | около 11 лет назад |
![]() | BDU:2014-00109 Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии | CVSS2: 6.9 | 60% Средний | около 11 лет назад |
![]() | CVE-2012-6647 The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command. | CVSS2: 4.9 | 0% Низкий | около 11 лет назад |
![]() | CVE-2012-6647 The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command. | CVSS2: 4.9 | 0% Низкий | почти 13 лет назад |
![]() | CVE-2012-6647 The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command. | CVSS2: 4.9 | 0% Низкий | около 11 лет назад |
CVE-2012-6647 The futex_wait_requeue_pi function in kernel/futex.c in the Linux kern ... | CVSS2: 4.9 | 0% Низкий | около 11 лет назад | |
![]() | BDU:2014-00064 Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании | CVSS2: 4.9 | 0% Низкий | около 11 лет назад |
![]() | SUSE-SU-2015:0652-1 Security update for Kernel | около 13 лет назад | ||
ELSA-2014-3052 ELSA-2014-3052: unbreakable enterprise kernel security update (IMPORTANT) | почти 11 лет назад | |||
GHSA-mvmp-r53f-9r47 The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command. | 0% Низкий | около 3 лет назад | ||
ELSA-2014-3034 ELSA-2014-3034: Unbreakable Enterprise kernel security update (IMPORTANT) | около 11 лет назад |
Уязвимостей на страницу